General
-
Target
NitroRansomware.exe
-
Size
690KB
-
Sample
231125-wktmkabh33
-
MD5
0aa959049ed181008cd30a818ca4abc1
-
SHA1
9dee42230d2b31eebe14e68c103c7423fcb5de92
-
SHA256
faaac111b93bcfdc0024a28ee3d07a4e1a464d0211cac0eb387dc8542be69048
-
SHA512
90315cdabbfd0826d39cc4ea166cd037a371e72e9068926f8da0c00a9a59d00114b0422c2ecc59527e08e426a7a9d96c2b1a94592995707c58453a39e45fac91
-
SSDEEP
12288:08+ACgkCHHdmg0ByvR4mWWaqMpWTYkmIWXoKOvp5y8HN7CzsXgxx9/06UqU4q:JkamxmWeeWFDuorh57HN7Czswxj/tVO
Static task
static1
Behavioral task
behavioral1
Sample
NitroRansomware.exe
Resource
win10v2004-20231023-en
Malware Config
Targets
-
-
Target
NitroRansomware.exe
-
Size
690KB
-
MD5
0aa959049ed181008cd30a818ca4abc1
-
SHA1
9dee42230d2b31eebe14e68c103c7423fcb5de92
-
SHA256
faaac111b93bcfdc0024a28ee3d07a4e1a464d0211cac0eb387dc8542be69048
-
SHA512
90315cdabbfd0826d39cc4ea166cd037a371e72e9068926f8da0c00a9a59d00114b0422c2ecc59527e08e426a7a9d96c2b1a94592995707c58453a39e45fac91
-
SSDEEP
12288:08+ACgkCHHdmg0ByvR4mWWaqMpWTYkmIWXoKOvp5y8HN7CzsXgxx9/06UqU4q:JkamxmWeeWFDuorh57HN7Czswxj/tVO
Score10/10-
Renames multiple (78) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-